evaluating bft protocols for spire
play

Evaluating BFT Protocols for Spire Henry Schuh & Sam Beckley - PowerPoint PPT Presentation

Evaluating BFT Protocols for Spire Henry Schuh & Sam Beckley 600.667 Advanced Distributed Systems & Networks SCADA & Spire Overview High-Performance, Scalable Spire Trusted Platform Module Known Network Characteristics


  1. Evaluating BFT Protocols for Spire Henry Schuh & Sam Beckley 600.667 Advanced Distributed Systems & Networks

  2. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  3. Power Grid Overview

  4. SCADA Overview

  5. SCADA Requirements • Must have very low latencies (100-200ms) • Must have very high reliability • Must be able to run for decades

  6. SCADA Adopting IP & Internet • In the past SCADA used proprietary protocols on air gapped systems • Now moving to both IP & the Internet to reduce costs

  7. “These devices were not only internet facing, they did not have 
 security mechanisms to prevent unauthorized access” - Trend Micro Incorporated, Who’s Really Attacking Your ICS Systems

  8. 
 Attacks on SCADA Systems 28 Days: 39 Attacks 
 All targeted specifically at SCADA systems 
 The first attack was within 18 hours of the honeypot going live Source: Trend Micro Incorporated, Who’s Really Attacking Your ICS Systems

  9. 
 Distributed Replication • Several machines that coordinate their actions such that they appear to be a single unified machine to a client. 
 Pros: High Availability and Performance 
 Cons: Cost of Synchronization

  10. 
 Intrusion Tolerant Replication Somewhat Formally: The ability to make progress in the presence of some number of malicious replicas with guaranteed correctness. Some protocols also guarantee a level of performance under attack. Informally: If some of the replicas get hacked the system still works.

  11. Defense Across Space & Time Defense Across Time: Have to periodically regain control of a compromised machine to stop the attacker from eventually gaining control of the entire network. Defense Across Space: Every replica must present a unique attack surface so that one attack cannot be used to compromise every replica.

  12. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  13. Spire Open Source SCADA system that provides both standard crypto defense mechanisms as well as an intrusion tolerant SCADA Master. Spire uses several different technologies • Prime • Spines • PVBrowser

  14. Spire Internal Spines Network SCADA SCADA SCADA SCADA Master Master Master Master Prime Prime Prime Prime External Spines Network RTU / PLC RTU / PLC pvbrowser HMI Proxy Proxy RTU PLC

  15. Scaling Spire In order to tolerate more intrusions we need more replicas The more replicas, the higher the latency becomes We rely on having very low latency

  16. Our Mission Find a way to make Spire more scalable, to allow for more replicas, and thus more intrusions

  17. 3 Angles of Attack Trusted Hardware - using a TPM Taking Advantage of Known Network Characteristics Hierarchy of Protocols

  18. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  19. Trusted Platform Module Specialized chip that holds a secret key and can perform cryptographic functions for the rest of the machine The key never leaves the TPM Too slow :’(

  20. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  21. Leverage Network Characteristics SCADA deployments are static and predictable Most importantly, we know: • Geographically close - low latency communication • Consistent number of clients and messaging pattern

  22. The Three BFT Protocol Families PBFT Spinning Prime

  23. PBFT PBFT Spinning Prime

  24. 
 PBFT When the leader fails we must perform a “view change” This is by far the most expensive operation in PBFT 
 “[The view change] is the Achilles Heel” -Yair Amir

  25. Spinning Every ordering is done by a different leader A bad leader can delay exactly one ordering before it is evicted from the protocol

  26. Prime Designed to remove load from the leader to allow for many clients without performance degradation Performs one ordering every X milliseconds

  27. Prime

  28. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  29. BFT-SMART Implements “ Yet Another Visit to Paxos” protocol 
 • (IBM Zurich) in Java Modular, multi-threaded server replicas • Standard BFT message pattern • Modern protocol with ongoing development •

  30. Multithreaded Design Request Request Service Reply Client Request Server Reply Timer Thread 1 Replica Thread Thread Message Leader Processor Thread Thread … … Sender Sender Receiver Receiver Thread 1 Thread n-1 Thread 1 Thread n-1 Server Consensus Communication

  31. BFT-SMART and Performance Attacks Consensus relies on leader to order messages • A malicious leader could delay progress • Timeouts limit the leader’s worst-cast performance • Propose (Pre-Prepare) Pre-Prepare Client Malicious Delay Malicious Delay 0 Leader (primary) Replica 1 1 Replica 2 2 Replica 3 3

  32. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  33. Simulating a SCADA Network 3 replicas per site n = 12 NYC f = 3 4ms 4ms 3ms JHU SVG 3ms 2ms 2ms WAS

  34. Normal-Case Latency Mean Latency vs. Number of Clients Me 45 40 35 30 Mean Latency (ms) 25 20 15 10 5 0 0 10 20 30 40 50 60 70 80 90 100 Number of Clients BFT-SMART Prime

  35. Normal-Case Latency • Significantly lower with BFT-SMART, but increasing with number of clients • Matches expectations given fewer consensus rounds • Constant with Prime, due to batch ordering on a preset interval of 20ms

  36. Performance Attack Latency Tested 4 timeouts, chosen based on normal performance • 1. 8ms (aggressive) 2. 10ms (conservative)

  37. Performance Attack Latency Tested 4 timeouts, chosen based on normal performance • 1. 8ms (aggressive) 2. 10ms (conservative) 3. 16ms (aggressive, forwarding request at 8ms) 4. 20ms (conservative, forwarding request at 10ms)

  38. Performance Attack Latency • Developed a malicious replica to delay sending pre-prepare messages as leader • Experimentally maximized delay up to each view change timeout • Measured worst-case latency seen by client under this condition

  39. Performance Attack Latency Measured Latency vs. Timeout Me 35 30 Mean Worst-Case Latency (ms) 25 20 15 10 5 0 5 7 9 11 13 15 17 19 21 23 Pre-Prepare Timeout (ms) Worst-Case Latency Normal Latency

  40. Performance Attack Latency • With a tight timeout, performance degradation is minimal • With a conservative timeout, performance degradation approaches 50% (26ms latency) • In either case, lower than normal-case Prime and exceeds the required performance • This performance attack would not pose a risk to the SCADA system

  41. View Change 50-70ms depending on number of pending requests • Slow due to unoptimized serialization, data structures, taking up • to 40ms Sequential view changes are an issue with multiple faulty replicas • With f ≥ 3 , view change must be improved to meet the • 200ms requirement Prime view changes are on the order of 60-90ms •

  42. Scalability Overhead LA LAN La Latency vs. Number of Replicas 600 500 400 Latency (µs) 300 La 200 100 0 0 5 10 15 20 25 Nu Number of replicas (n)

  43. Scalability Overhead • Shows the computational overhead of increasing n • Latency appears linear with n , and grows at a reasonable rate • Actual latency determined by location of added replicas • Another geographic site vs. more replicas 
 per site

  44. • SCADA & Spire Overview • High-Performance, Scalable Spire • Trusted Platform Module • Known Network Characteristics • Evaluating BFT-SMART • Benchmarking Results • Conclusions

  45. BFT-SMART: Pros & Cons PROS • Lightweight protocol & implementation • Possible to apply aggressive timeout • Low normal-case latency • Support for dynamic state transfer, reconfiguration/recovery CONS • Latency increases with number of clients, concurrent requests • High view change cost • Java implementation

  46. Prime: Pros & Cons PROS • Leader is not burdened by client requests • Bounded performance guarantee under attack • Latency remains constant as number of clients increases • Measurements performed so replicas can adapt to network conditions CONS • 2 more consensus rounds per ordering • High view change cost • Significantly higher normal-case latency

  47. Conclusions • Strict limit on performance attacks possible with a lightweight protocol and bounded network latencies • View change still a high cost, but could be optimized • A viable path to scaling Spire • However, BFT-SMART introduces some new issues

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend